Hi Scott,
At 10:34 20-01-2012, Scott Kitterman wrote:
If this issue, AIUI, is that someone is worried that later this will be
referenced in an inappropriate way, I'm not sure what would satisfy that.  I
think it's already clear.

I don't think so.  One of the points mentioned by Murray [1] was:

  "the concern is that doing something like this on the standards
   track might lead future efforts to believe this mechanism is
   sufficient for arbitrary data protection when it is not."

One of the questions asked by the Responsible AD [2] was:

  "why there is any objection to doing HMAC (since it isn't hard to do)?"

The text from the DISCUSS is:

 "I don't think that's ok. I think you want HMAC() and not H().

  If I could supply a redactor with a zero length "private" string,
  e.g. message with a header field like "To: @example.org" then the
  redactor will send H(redaction-key) which can then allow (via
  hash-continuation) checking if any value matches a value from an
  output here.

  If the alphabet for sensitive values has N characters
  then I can also send "To: "+char[i]+"@example.org" for
  each i and then play the continuation game on that.
  Same for two character prefixes etc.

 (2) I can also use this to validate guesses of the redaction
 key value. I need to think about how one might avoid that
 or if its possible to avoid that."

Regards,
-sm

1. http://www.ietf.org/mail-archive/web/marf/current/msg01681.html
2. http://www.ietf.org/mail-archive/web/marf/current/msg01691.html
_______________________________________________
marf mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/marf

Reply via email to